Sciweavers

11211 search results - page 1732 / 2243
» Rank-Sensitive Data Structures
Sort
View
ADC
2005
Springer
183views Database» more  ADC 2005»
15 years 10 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...
160
Voted
AVBPA
2005
Springer
303views Biometrics» more  AVBPA 2005»
15 years 10 months ago
Indexing Biometric Databases Using Pyramid Technique
Abstract. Biometric identification has emerged as a reliable means of controlling access to both physical and virtual spaces. In spite of the rapid proliferation of large-scale dat...
Amit Mhatre, Sharat Chikkerur, Venu Govindaraju
DEXA
2005
Springer
160views Database» more  DEXA 2005»
15 years 10 months ago
Improved Sequential Pattern Mining Using an Extended Bitmap Representation
The main challenge of mining sequential patterns is the high processing cost of support counting for large amount of candidate patterns. For solving this problem, SPAM algorithm wa...
Chien-Liang Wu, Jia-Ling Koh, Pao-Ying An
131
Voted
ECSQARU
2005
Springer
15 years 10 months ago
On the Use of Restrictions for Learning Bayesian Networks
In this paper we explore the use of several types of structural restrictions within algorithms for learning Bayesian networks. These restrictions may codify expert knowledge in a g...
Luis M. de Campos, Javier Gomez Castellano
132
Voted
ERCIMDL
2005
Springer
115views Education» more  ERCIMDL 2005»
15 years 10 months ago
A No-Compromises Architecture for Digital Document Preservation
Abstract. The Multivalent Document Model offers a practical, proven, nocompromises architecture for preserving digital documents of potentially any data format. We have implemented...
Thomas A. Phelps, Paul B. Watry
« Prev « First page 1732 / 2243 Last » Next »